security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Analyzes wireless protocols and radio frequency security to identify vulnerabilities in IoT, mobile, and physical access systems.
Enforces modern Git security protocols including signed commits, zero-trust workflows, and proactive secret scanning.
Optimizes test suites with expert guidance on Vitest 3.x features, including the Annotation API, enhanced mocking, and workspace configurations.
Integrates comprehensive security scanning into Azure Pipelines using Microsoft Defender for Cloud to automate vulnerability detection.
Implements high-velocity trunk-based development and AI-driven security scanning for modern GitHub repositories.
Implements robust, user-centric testing suites for React applications using Vitest, Jest, and React Testing Library.
Implements systematic security analysis methodologies to identify, assess, and mitigate software vulnerabilities during the design phase.
Automatically detects project tech stacks and executes a comprehensive parallel security analysis using relevant scanners and AI subagents.
Identifies and audits source code for privacy threats related to undisclosed data collection, missing consent mechanisms, and transparency gaps.
Analyzes source code for privacy regulation violations including GDPR, CCPA, and HIPAA non-compliance.
Analyzes application workflows and business rules to identify logic-based security vulnerabilities that automated scanners often miss.
Scans source code to identify and mitigate vulnerabilities that could lead to service disruptions or resource exhaustion.
Calculates business-weighted risk scores and generates prioritized remediation roadmaps for the PASTA threat modeling framework.
Identifies and remediates hardcoded credentials, API keys, and sensitive tokens across source code and git history.
Provides instant definitions and framework mappings for application security terms and vulnerability classes.
Analyzes source code and CI/CD pipelines to detect software integrity violations, insecure deserialization, and supply chain vulnerabilities.
Analyzes implementation plans and architecture designs to identify security vulnerabilities before a single line of code is written.
Automates the creation and management of Golang interface mocks using mockery and go:generate to ensure consistent unit testing.
Enforces a rigorous, four-phase methodology to identify root causes and implement reliable fixes for software bugs.
Enforces rigorous verification and evidence-based reporting before any task or code change is marked as complete.
Analyzes source code for detectability threats and timing side channels to prevent unauthorized inference of system interactions.
Executes and parses remote unit tests as a final quality gate for code verification.
Identifies authorization vulnerabilities and privilege escalation paths within your source code using the STRIDE threat modeling framework.
Audits source code for SQL, NoSQL, and command injection vulnerabilities to align with OWASP Top 10 security standards.
Performs comprehensive security and safety assessments of agent skills and MCP servers to identify prompt injection risks, malicious code, and data exfiltration attempts.
Enforces a rigorous Red-Green-Refactor workflow by requiring failing tests before any production code implementation.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Simulates realistic exploit chains and scores vulnerability exploitability using the PASTA threat modeling framework.
Automates and debugs local web applications using Playwright for robust end-to-end testing and UI verification.
Performs comprehensive security threat modeling by dispatching parallel subagents to analyze codebases for STRIDE framework vulnerabilities.
Scroll for more results...